Standards in this Framework
Standards Mapped
Mapped to Course
Standard | Lessons |
---|---|
AP1.a.6.m
Decompose (break down) a computational problem into parts and create solutions for one or more parts. |
|
AP1.a.7.m
Identify how sub-problems could be recombined to create something new (e.g., break down the individual parts that would be needed to program a certain type of game and then show how the parts could be reused in other types of games). |
|
AP2.a.6.m
Develop programs, both independently and collaboratively, which include sequencing with nested loops and multiple branches [Clarification At this level, students may use block-based and/or text- based languages]. |
|
AP2.a.7.m
Produce computational artifacts with broad accessibility and usability through careful consideration of diverse needs and wants of the community. |
|
AP2.a.8.m
Use an iterative design process (e.g., define the problem; generate ideas; build, test, and improve solutions) to solve computational problems, both independently and collaboratively. |
|
AP2.a.9.m
Create variables that represent different types of data and manipulate their values. |
|
AP3.a.3.m
Provide proper attribution when code is borrowed or built upon. |
|
AP3.b.5.m
Discuss how algorithms have impacted society— both the beneficial and harmful effects. |
|
AP3.b.6.m
Compare different algorithms that may be used to solve the same problem in terms of their speed, clarity, and size (e.g., different algorithms solve the same problem, but one might be faster than the other). [Clarification Students are not expected to quantify these differences]. |
|
AP3.b.7.m
Modify existing code to change its functionality and discuss the variety of ways in which to do this. |
|
AP3.c.1.m
Interpret the flow of execution of algorithms and predict their outcomes. [Clarification Algorithms can be expressed using natural language, flow and control diagrams, comments within code, and pseudocode]. |
|
AP3.c.2.m
Use documentation regarding code to modify programs. |
|
AP4.a.3.m
Define and use functions/ procedures that hide the complexity of a task and can be reused to solve similar tasks. [Clarification Students use and modify, but do not necessarily create, functions or procedures with parameters]. |
|
AP5.a.5.m
Solicit and integrate peer feedback as appropriate to develop or refine a program. |
|
AP5.b.2.m
Analyze team members’ strengths and use them to foster an inclusive computing culture. |
|
AP6.a.3.m
Use testing and debugging methods to ensure program correctness and completeness. |
|
AP6.b.2.m
Apply a rubric to determine if and how well a program meets objectives. |
|
CS1.a.5.m
Justify the suitability of hardware and software chosen to accomplish a task (e.g., comparison of the features of a tablet vs. desktop, selecting which sensors and platform to use in building a robot or developing a mobile app). |
|
CS2.a.3.m
Use a systematic process to identify the source of a problem within individual and connected devices (e.g., follow a troubleshooting flow diagram, make changes to software to see if hardware will work, restart device, check connections, swap in working components). |
|
CS3.a.1.m
Analyze the relationship between a device's computational components and its capabilities. (e.g., computing systems include not only computers, but also cars, microwaves, smartphones, traffic lights, and flash drives). |
|
CS4.a.1.m
Extend or modify existing programs to add simple features and behaviors using different forms of inputs and outputs (e.g., inputs such as sensors, mouse clicks, data sets; outputs such as text, graphics, sounds). |
|
DA1.a.3.m
Represent data using different encoding schemes (e.g., binary, Unicode, Morse code, shorthand, student-created codes). |
|
DA2.a.3.m
Gather and organize multiple quantitative data elements using a computational tool (e.g., spreadsheet software). |
|
DA2.b.3.m
Develop a strategy to answer a question by using a computer to manipulate (e.g., sort, total and/or average, chart, graph) and analyze data that has been collected by the class or student. |
|
DA3.a.4.m
Describe how different formats of stored data represent tradeoffs between quality and size. [Clarification compare examples of music, text and/or image formats]. |
|
DA3.a.5.m
Explain the processes used to collect, transform, and analyze data to solve a problem using computational tools (e.g., use an app or spreadsheet form to collect data, decide which data to use or ignore, and choose a visualization method). |
|
DA4.a.4.m
Revise computational models to more accurately reflect real-world systems (e.g., ecosystems, epidemics, spread of ideas). |
|
DA4.a.5.m
Modify an existing computational model to emphasize key features and relationships within a system. (A model can be used to simulate events, examine theories and inferences, or make predictions). |
|
IC1.a.4.m
Provide examples of how computational artifacts and devices impact health and wellbeing, both positively and negatively, locally and globally (e.g., effects of globalization, and automation). |
|
IC1.a.5.m
Explain how computer science fosters innovation and can enhance careers and disciplines. |
|
IC1.b.3.m
Analyze and present beneficial and harmful effects of personal electronic communication and social electronic communication. |
|
IC1.b.4.m
Describe ways in which the internet impacts global communication and collaborating. |
|
IC2.a.2.m
Explain the impact of the digital divide (i.e., uneven access to computing, computing education, and interfaces) on access to critical information. |
|
IC2.b.2.m
Critically evaluate and redesign a computational artifact to remove barriers to universal access (e.g., using captions on images, high contrast colors, and/or larger font sizes). |
|
IC2.c.4.m
Use the internet ethically and safely to work with a group of people who are not physically near to solve a problem or reach a goal. |
|
IC3.a.2.m
Understand laws associated with digital information (e.g., intellectual property, fair use, and Creative Commons). |
|
IC3.a.3.m
Describe ethical issues that relate to computing devices and networks (e.g., equity of access, security, hacking, intellectual property, copyright, Creative Commons licensing, and plagiarism). |
|
IC3.b.4.m
Analyze and summarize negative and positive impacts of using data and information to categorize people, predict behavior, and make recommenda- tions based on those predictions (e.g., customizing search results or targeted advertising based on previous browsing history can save search time and limit options at the same time). |
|
NI1.a.4.m
Analyze and summarize security risks associated with weak passwords, lack of encryption, insecure transactions, and persistence of data. |
|
NI1.a.5.m
Understand security issues with general computer use. |
|
NI1.b.2.m
Understand security issues with general computer use. |
|
NI2.a.6.m
Simulate how information is transmitted as packets through multiple devices over the internet and networks. |
|
NI2.a.7.m
Explain, using basic terms, how a wireless or cellular network allows internet information to be transmitted from a server to a user device. |
|
NI2.b.2.m
Define the term protocol, provide an example of protocols in daily life, and explain their use on the internet. |
|
NI2.c.3.m
Explain the hierarchical structure of the Internet Domain Name System (IDNS). |
|
NI2.d.2.m
Encode and decode text- based messages using basic algorithms (e.g., shift cipher, substitution cipher). |
|